To fulfil a request will vary depending upon exactly Maintain user and customer satisfaction
what is being requested. Source and deliver the components of requested
ITIL SERVICE OPERATION
Note that ultimately it will be up to each organization to Formal request form a user for something to be provided standard services Technical Objectives decide and document which service request it will E.g. Password changes, access to printers, PC moves Assist with general information, complaints or Help plan, implement and maintain stable technical Management infrastructure to support business processes handle through the request fulfilment process comments Well designed, resilient and cost effective topology Scope Objectives Keep infrastructure in optimum condition Diagnose and resolve technical failures REQUEST FULFILMENT Benedito, Christian, Kara, Abrahams, Peters, Smith, Nombewu Roles Technical manager/team leader leadership, control and decision making for the team Purpose providing technical knowledge and leadership Objectives Scope Value ensuring training, awareness and experience levels PROBLEM maintained Request fulfilment is thedsd process responsible for MANAGEMENT Undertake activities and Service Operation covers all managing the lifecycle of all service requests from the Effective Service Operation performing line management processes to manage and areas of service processes and reporting to senior management on technical issues as users. PROCESS FLOW deliver services at the levels Deliver the service as delivery, including: functions help organizations required agreed with business users agreed on in the SLA services (internal, external to: Technical analyst/architect and customers. Reduce both the number and customer/user) reduce the impact and Determine evolving needs of users, sponsors, stakeholders The ongoing management and impact of outages service management frequency of outages Establish system requirements of the technology that is Controlling access to IT processes (see next slide) Resolution and provide access to defining and maintaining knowledge about systems dependencies Reactive Problem Management used to deliver and support services Recovery – Cause technology standard service performing cost benefit analyses services removed and service developing operational models that will optimize resource utilization and take place as a result of an incident restored maximize performance configuring the infrastructure to deliver consistent and reliable performance deliver report STEP 9 STEP 1 defining all the tasks required to manage the infrastructure Technical Management is treated in ITIL as a "function". help prevent the incident from It plays an important role in the management of the IT recurring or provide a Role of Communication in Service Operation infrastructure. workaround if avoidance is impossible STEP 8 Problem Closure – Detect Problem – Role: Pro-active Problem Management Check that all events Reactive or proactive All communication must have an intended purpose or a resultant action. Many Technical Management activities are embedded in various ITIL processes - detection (triggers in are recorded Any means of communication can be used as long as stakeholders understand when but not all Technical Management activities. For this reason, at IT Process Maps Notes) and where communication will take place. Warning: A notification that a pre-defined threshold Informational: signifies something expected and we decided to introduce a Technical Management process as part of the ITIL analyzes incident records to identify Types of communication: has been reached. Action may or may not be required normal Process Map which contains the Technical Management activities not covered in underlying causes of has happened, and which does not require any action Raise known error E.g. 5% hard disk capacity available any other ITIL process. incidents Routine operational communication E.g. scheduled backup has completed normally record – Problem with analysis of previous incidents reveals Between shifts, Projects a trend or pattern that a documented cause Performance reporting and workaround stored Event Types was not apparent when each incident in KEDB Communication related to change, exception & emergency Technical Management activities embedded in other occurred Training on new or customized processes and service designs processes are shown there, with responsibility assigned to STEP 10 STEP 2 Communication of strategy, design, and transition to service operation teams the Technical Analyst role.
Exception: A notification that a service or component is
Management Positions operating abnormally. Action is usually required STEP 7 Major Problem Review Log Problem – Raise E.g. a router failing – Reflect on major Shift Leader record with details of problems as part of problem Service Desk Services training for support IT Operations Manager Handles incidents, resolving as many as possible, where the resolution is staff or proactive straightforward problem management Super user Owns incidents that are escalated to other support groups for resolution IT Operation Analysis Reports problems to the problem management staff members Recruited from business to take on some IT responsibilities Workarounds – Facilitate communication between IT and business Handles service requests Known-Error Database IT Operator Provides information to users Temporary way of Reinforce user expectations about agreed service levels ALERT overcoming difficulty Communicates with the business about major incidents, upcoming Training for users in their area changes, and so on a notification that a threshold STEP 3 Support for minor incidents Purpose is to allow storage of previous knowledge Manages requests for change on the user’s behalf if required has been reached, something Involved with new releases and roll outs Manage events through their of incidents and problems. Scope: Manages the performance of third-party maintenance providers has changed, or a failure has Any change of state that has lifecycle EVENT Define & Known error record should hold exact details. Access management is effectively the Monitors incidents and service requests against the targets in the SLA occurred Purpose Event management is the basis significance for the management Essential that any data put into the database can be ACCESS MANAGEMENT
Explain Event STEP 6
execution of the policies in information Updates the CMS as required a means of acquiring human for operational monitoring and MANAGEMENT of a configuration item (CI) or IT quickly and accurately recovered. security. Gathers availability figures, based on incident data intervention service Categorise Problem – AM gives rights to use a service but also control Care should be taken to avoid duplication of often created and managed by Events are recognized by Record service/ makes sure its available at agreed times. system management tools records. notifications through IT service, component affecte AM is a process that is executed by all CI or monitoring tool technical and application management Propose functions, usually not separate function. Purpose of access management is Detect changes of state for the to provide the right to be able to Objectives management of a CI and IT service Objectives: use a service or group of services. Role: Determine control action for events and Problem Investigation Improved customer service, perception and satisfaction Objectives: Logging all relevant incidents ensure these are communicated to the and Diagnosis – Increased accessibility through a single point of contact Manage access to services based on policies Providing first line investigation and diagnosis appropriate functions Configuration Items (CI) Diagnose root cause Better quality and faster turnaround and actions. Resolving incidents at first contact Provide the trigger to execute many Some are included because they Efficiently respond to requests for granting Improved teamwork and communication Scope STEP 4 Escalating incidents that cannot be resolved within service operation processes and operation need to stay in a constant state access to services. Enhanced focus and proactive approach to service A service desk is a functional unit made up of a agreed timescale management activities Some are included because their Oversee access to services and ensure rights provision dedicated number of staff responsible for Keeping users informed of progress Comparing actual operating performance status needs to change frequently Reduced negative business impact being provided are not improperly used. dealing with a variety of service activities, Closing all resolved incidents and behavior against design standards and Environmental conditions STEP 5 Better management infrastructure and control usually made via Telephone calls, web interface Conducting customers surveys SLAs Software license monitoring Improved usage of IT support resources Provide a basis for service assurance, Prioritize Problem – ID or automatically reported infrastructure events. Communicating with users Security More meaningful management reporting and improvement Normal Activity importance of incident based on impact and urgency Regular scrutiny and Organizational Structure/Types of service desks. improvements to achieve improved service at Principles and Basic Concepts of Incident Management reduces costs Centralised Service Desk Follow the sun Virtual Service Desk Local Service desk Priority – To agree and allocate an appropriate prioritization code Swift application of Incident Tracking: to an incident, this will determine Different time zones Incidents should be tracked throughout their lifecycle to support proper handling and how the incident is handled both IT OPERATIONS operational skills to 24hour coverage Use technology and tools Higher volume of calls reporting on the status of incidents. diagnose and resolve to give impression of single specialised groups of users by support tools and support staff MANAGEMENT Open – Incident recognized but not yet assigned to a support resource any IT failures that low costs service desk. Higher skill levels VIP status of users In Progress – Incident in progress of being investigated Urgency – Refers to how quickly occur. Resolved – Resolution has been placed for incident but normal state service the business needs a resolution to operation has not yet been validated an incident Closed – User or business has agreed that incident has been resolved Maintenance of the Impact – Indication of impact is status of day to day Major incidents are separate procedures, with shorter timescales and greater urgency. Definition of what constitutes a major incident must be agreed and ideally mapped onto often the number of users being processes and activities App Development vs Management affected overall incident prioritization scheme. A single interface to the business for all stages of th e business lifecycle, common PRINCIPLES AND BASIC CONCEPTS requirements and specific-setting process Problem models Scope: Information Technology Operations Control consists of: Development teams show be held partially accountable for design flaws that create Incident Management includes Incidents vs problems operational outages Incident: Reactive and proactive problem any event which disrupts, or management: Management staff show be held partially accountable for contribution to the technical An unplanned interruption could disrupt a service. This Maintainence Print & Output architecture and manageability design of applications to an IT service or reduction Reactive: process activities are triggered in includes events which are Job in the quality of an IT Purformance Schedueling reaction to an incident that has taken place A single change management process for both groups service communicated directly by users, Console Backup & Proactive: process activities are triggered by Management Restore A clear mapping of development and management activities throughout the lifecycle wither through service desk or activities seeking to improve services Techniques of Incident Management through an interface from event Focus on integrating functionality and manageability requirements Functional Escalation INCIDENT management to incident Purpose: PROBLEM MANAGEMENT Management Escalation Purpose of Incident MANAGEMENT management tools. Objectives: Hierarchic Escalation Management is to restore To support the Role: normal service operation as organizations business process. Custodian of technical knowledge and expertise quickly as possible and Problem: The unknown cause of one or more incidents Provides the actual resources to support the service These objectives are achieved through: Interfaces: Process activities, methods Applications that are well designed, resilient and cost- minimize the adverse impact Service Design To manage the lifecycle of all lifecycle. Providing guidance to IT operations on how to Objectives: and techniques. effective on a business operations, Service level management – Input for SLA problems from first identification. carry out the ongoing operational management of Methods of Incident Management Ensure that standardized methods and Purpose: The required functionality is available to achieve the thus ensuring agreed levels Information security management – Security Seeks to minimize the adverse applications.The integration of the application required business outcome Incident Identification – Work can only procedures are used Problem detection management lifecycle. of service quality are related incidents impact of incidents begin when it is known that an incident had Increase visibility and communication Organization of adequate technical skills occurred maintained. Capacity management – Trigger for performance of incidents to business and IT support monitoring Prevent problems and resulting Suspicion or detection of a Incident Logging – All relevant information Availability management – Availability of IT cau7se of one or more incidents Incident Models: staff incidents from happening of incident must be logged and date/ time Enhance business perception of IT services Objectives Eliminate recurring incidents by the service desk. APPLICATION stamped An incident model is a way of Service Transition Analysis of incident Incident Categorization – Must be predefining the steps that should through use of professional approach in Minimize the impact of incidents Notification of supplier or MANAGEMENT Problem Service Asset and Configuration Management – ID that cannot be prevented Raising a known error record. allocated with an incident categorization be taken to handle a process in resolving and communicating incidents faulty equipment controller Known error is defined as a problem Workarounds Problem Logging Categorization coding so exact type of incident is recorded an agreed way. Align incident management activities Change Management – Workaround need a RFC Includes the activities required to with a documented root cause and In some cases may be possible to find a User details Problems should be Incident Prioritization – Allocate an Steps that should be taken to and priorities with those of the Service Operation diagnose the root cause of incidents. Problem prioritization. workaround. categorized same way as Activities of incident workaround to the incidents. Service details appropriate prioritization code to handle incident business Problem Management – Investigate and resolve Scope: Will also maintain information about Can system be recovered? Known error record should identify When workaround is found, it is important Equipment details incidents. determine how the incident is handled management Chronological order these Maintain user satisfaction with quality underlying cause problems and the appropriate How much will it cost? the problem record it relates to and that the problem record remain open. Date/time initially logged True nature of the Incident Closure – Service desk to check if of IT services Access Management – Unauthorized access document the status of actions being steps should be taken in workarounds and resolutions How long will it take to fix the In some cases may be multiple problem must be easily incident is resolved and that users are attempts problem? taken to resolve the problem. Incident description traced Responsibilities workarounds. satisfied Precautions to be taken